Nearly, in the middle of 1970s the split-brain theory became the only theory that explains human creativity used in all fine art and art education schools. In fact, this theory- which appeared for first time in the middle of 1940s – faced many radical changes including its concepts and structures, and these changes affected both teaching art and art criticism. To update people awareness within art field of study, this paper reviews the split-brain theory and its relationship with teaching art from its appearance to its decay in 2013 and after.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
The No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreThe Baha'is are a group that belongs to the Baha'iya, the Baha'iya according to the encyclopedia of Religion Sciences is a modern religious sect appeared in existence in the middle of the ninetieth century. The number of their believers is around six million people of different parts of the world. its main center lies in Haifa city in Palestine
The Baha'is are a group that belongs to the Baha'iya, the Baha'iya according to the encyclopedia of Religion Sciences is a modern religious sect appeared in existence in the middle of the ninetieth century. The number of their believers is around six million people of different parts of the world. its main center lies in Haifa city in Palestine.
Receipt date:2/17/2021 acceptance date:3/16/2021 Publishing date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
Objective: This paper investigates the contradictions in the decision-making process of the United States, which historically proven to be successful policies in the short term, but in the long term proven to be wanting and failure. Methodology: The paper uses descriptive, historical, comparative method. A
... Show MoreThis paper presents the results of the slope failure analyses from fracture distributions and their relation to tectonic activity; the analytical results have indicated that the phenomena of plane failure, wedge failure and toppling failure can occur at almost of the survey sites within the study area.
The statistical data show that the fracture orientation mainly develop in the E-W, N-S and NW-SE due to the influence of tectonic activity. The occurrence of them together with the rock slope surface orientation has formed plane failure on the slope surface of the 3B highway in the E-W direction and the types of wedge failure and toppling failure on the slope surface of the highw
... Show MoreDeep Learning Techniques For Skull Stripping of Brain MR Images
Explainable Artificial Intelligence (XAI) techniques enable transparency and trust in automated visual inspection systems by making black-box machine learning models understandable. While XAI has been widely applied, prior reviews have not addressed the specific demands of industrial and medical inspection tasks. This paper reviews studies applying XAI techniques to visual inspection across industrial and medical domains. A systematic search was conducted in IEEE Xplore, Scopus, PubMed, arXiv, and Web of Science for studies published between 2014 and 2025, with inclusion criteria requiring the application of XAI in inspection tasks using public or domain-specific datasets. From an initial pool of studies, 75 were included and categorized in
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More